• No results found

Security Services

Prioritisation of Network Security Services

Prioritisation of Network Security Services

... network security services is much needed in order to successfully protect critical IT assets, particularly as many networks are allowing more diverse and extended connectivity, which is resulting in ...

31

VI. NGFW SECURITY SERVICES

VI. NGFW SECURITY SERVICES

... new security services are being integrated into ...new security services address current blind spots (caused by encryption), and allow decisions to be made based on content and context ...

5

Attitudes towards Outsourcing Security Services on Service Delivery in Commercial State Owned Enterprises in Nairobi City County, Kenya.

Attitudes towards Outsourcing Security Services on Service Delivery in Commercial State Owned Enterprises in Nairobi City County, Kenya.

... the services of private security companies/ industry that were traditionally undertaken by their military and the police; this is partly in response to public sector downsizing, but also because of the ...

74

Performance Evaluation of Add On Security Services Incorporated on Business Services

Performance Evaluation of Add On Security Services Incorporated on Business Services

... the security services that we have designed. Creation of new services and integrating our services results in the time delay during which our customers may decide to move onto some other ...

10

Monitoring and Improving Managed Security Services inside a Security Operation Center

Monitoring and Improving Managed Security Services inside a Security Operation Center

... of Security Operation Centers (SOC) are becoming crucial due to the emerging need of benefiting from Managed Security Services (MSS) rather than hiring in-house security ...

20

Cloud Security: Services, Risks, and a Case Study on Amazon Cloud Services

Cloud Security: Services, Risks, and a Case Study on Amazon Cloud Services

... a security risk is ...cloud services by the convergence of IT services and customers under a single manage- ment domain, combined with a general lack of transparency into provider process and ...

8

Integrating security services into active network

Integrating security services into active network

... new services that are injected into the ...supports security modules is introduced into the ANTS’s node operating system and a minor modification to the operating system is ...SJANTS security model ...

32

Security Enhancement Using TRI Model for Users' Acceptance and E learning Platform Success

Security Enhancement Using TRI Model for Users' Acceptance and E learning Platform Success

... Nevertheless, many limitations during the e-learning practice can be identified, especially the necessity of the assurance of security services such as data integrity, users authentication and information ...

10

Data Intensive Dynamic Scheduling Model and Algorithm for Cloud Computing Security

Data Intensive Dynamic Scheduling Model and Algorithm for Cloud Computing Security

... appropriate security level for each ...required security level which is already described in earlier ...higher security services requires much time and lower security services ...

13

CLOUD SECURITY: CONTROLS AND ISSUES

CLOUD SECURITY: CONTROLS AND ISSUES

... different security issues and security controls in cloud. Cloud security basically not any application software that can be offered or given as cloud ...to security services provided by ...

10

CLOUD SECURITY: CONTROLS AND ISSUES

CLOUD SECURITY: CONTROLS AND ISSUES

... different security issues and security controls in cloud. Cloud security basically not any application software that can be offered or given as cloud ...to security services provided by ...

7

Impact of Earnings per Share on Market Price of Share with Special Reference to Selected Companies Listed on NSE

Impact of Earnings per Share on Market Price of Share with Special Reference to Selected Companies Listed on NSE

... of security design template (SDT). After the security requirement and threats have been identified in the requirement phase and security services and design attributes identified in the first ...

9

A Malicious Attacks and Defense Techniques on Android Based Smartphone Platform

A Malicious Attacks and Defense Techniques on Android Based Smartphone Platform

... Google security services continuously offers the services to protect Android platform from cyber attackers but still attackers are ...the security enhancement. Table 1 list out the important ...

9

Cryptology For Security In Web Services

Cryptology For Security In Web Services

... information security in general is necessary. Information security manifests itself in many ways according to the situation and ...information security issues when the information is conveyed by ...

6

ANALYSIS OF SECURITY IN DIFFERENT CLOUD SERVICES

ANALYSIS OF SECURITY IN DIFFERENT CLOUD SERVICES

... on security and privacy concerns, which are seen as the primary obstacles to wide ...of security attacks on services and resources in cloud ...the security issues of cloud computing and in ...

13

Security Issues on Composite Web Services

Security Issues on Composite Web Services

... Web services are software system to support interoperable machine to machine interaction over the ...of services and it allow to communicate directly via ...the services. Composition of web ...

5

Simulation of Firewall Security of Cloud Server using Approach on Internet Connected System by Network Enumeration

Simulation of Firewall Security of Cloud Server using Approach on Internet Connected System by Network Enumeration

... A firewall is a network security system that controls the incoming and outgoing network traffic based on an applied rule set. A firewall establishes a barrier between a trusted, secure internal network and another ...

7

A Survey on Security Challenges in Cloud Services

A Survey on Security Challenges in Cloud Services

... the security of their provisions, they don't have the affirmation that the improvement environment devices gave by a Paas supplier are ...about security issues in ...a security concern as examined on ...

7

A Review on Web Services and Security Issues

A Review on Web Services and Security Issues

... Web services standards can address these proprietary ...web services are, in general, as well as in the context of data mining and ...web services is as follows: A web service client passes a request ...

7

Model Driven Architecture based Agile Modelled Layered Security Architecture for Web Services Extended to Cloud, Big Data and IOT

Model Driven Architecture based Agile Modelled Layered Security Architecture for Web Services Extended to Cloud, Big Data and IOT

... applications. Services are distributed components that provide well-defines interfaces that process and deliver XML ...workflows. Security in an SOA environment involves verifying several elements and ...

10

Show all 10000 documents...

Related subjects